Audit Report. Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland, Oregon

Size: px
Start display at page:

Download "Audit Report. Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland, Oregon"

Transcription

1 U.S. Department of Agriculture Office of Inspector General Western Region Audit Report Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland, Oregon Report No SF December 2004

2

3 Executive Summary Natural Resources Conservation Service Water and Climate Information System - Review of Application Controls (Audit Report No SF) Results in Brief This report presents the results of our audit of application controls within the Natural Resources Conservation Service s (NRCS) Water and Climate Information System (WCIS). Application controls are the measures an organization takes to provide for the safety, accuracy, and completeness of data within its information systems. Although, our review did not identify any concerns with the accuracy and completeness of data, we determined that management controls over system security were inadequate, leaving valuable data vulnerable to unauthorized access and alteration. Our audit disclosed conditions that need management action. Specifically, risk assessments were conducted according to outdated regulations. Security plans were not timely updated. Contingency plans to recover operations of WCIS in the event of major systems failures were not complete. The system had not been properly accredited or certified. Of most immediate concern, medium- and high-risk vulnerabilities should have been identified and mitigated as part of required periodic scanning. During conversations regarding these issues, the Chief Information Officer (CIO) (responsible for NRCS information systems) recognized that the agency lacked a mechanism to ensure that personnel were made aware of the relevant regulations (and changes to them). Such a control mechanism would provide the most up-to-date guidance available to personnel responsible for implementing regulations. In addition, the agency lacked a management oversight system that would as a matter of course involve the CIO in monitoring that the regulations were timely and properly implemented. For the risk vulnerabilities in the WCIS, such monitoring would have informed the CIO that field level personnel were not doing required tasks. Recommendation In Brief Establish controls to ensure that Office of Management and Budget (OMB), National Institute of Standards and Technology (NIST), and Departmental Information Technology (IT) security requirements are met, especially in the development of disaster recovery and security plans, risk assessments and the performance of vulnerability scans for all field units. Agency Response In its written response to the official draft report, dated October 27, 2004, NRCS generally concurred with the audit findings and recommendations. The complete written response is shown in exhibit A of the audit report. USDA/OIG-AUDIT/ SF Page i

4 OIG Position Based on NRCS written response, OIG accepts NRCS management decision for all audit recommendations, except for Recommendation Nos. 1 and 6. Additional information is needed in order to reach management decision on the two remaining recommendations. USDA/OIG-AUDIT/ SF Page ii

5 Abbreviations Used in This Report Center CIO CS GAO ISS ISSPM IT NRCS NIST OCIO OIG OMB USDA WCIS National Water and Climate Center Chief Information Officer Cyber Security (issued by OCIO) Government Accountability Office Information System Security Information System Security Program Manager Information Technology Natural Resources Conservation Service National Institute of Standards and Technology Office of the Chief Information Officer Office of Inspector General Office of Management and Budget United States Department of Agriculture Water and Climate Information System USDA/OIG-AUDIT/ SF Page iii

6 Table of Contents Executive Summary...i Abbreviations Used in This Report...iii Background and Objectives...1 Findings and Recommendations...3 Section 1. Management Oversight...3 Finding 1 NRCS Did Not Maintain Oversight or Control Over WCIS...3 Recommendation No Section 2. Security Weaknesses...5 Finding 2 Finding 3 Preventive Security Measures Did Not Meet Requirements...5 Recommendation No Recommendation No Recommendation No Recommendation No Recommendation No Recommendation No Vulnerability Scans Not Conducted...10 Recommendation No Recommendation No Scope and Methodology...12 Exhibit A NRCS Response to Draft Report...13 USDA/OIG-AUDIT/ SF Page iv

7 Background and Objectives Background USDA s Office of the Chief Information Officer (OCIO) is responsible for establishing, implementing, and overseeing a departmental-wide information security program, while the component agencies are responsible for the dayto-day management of information security for their mission-support systems. During 1999, USDA s Office of Inspector General and Government Accountability Office (GAO) found significant information security weaknesses at the Department s two major data centers, which placed critical assets at significant risk. In August 2000, the GAO released a report on USDA s information security to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives. The report, USDA Needs to Implement Its Departmentalwide Information Security Plan, states that automated systems are essential to USDA s operations and the delivery of its mission-critical programs, especially as it moves towards electronic government (e-government). One critical asset is NRCS Water Climate Information System (WCIS). WCIS is an extensive, automated system designed to collect snow pack and related climatic data in the western United States. The system evolved from NRCS's congressional mandate in the mid-1930's to measure snow pack in the mountains of the West and forecast the water supply. The program began with manual measurements of snow courses, but since 1980 it has relied on an automated system that has collected the data needed to produce water supply forecasts and to support the resource management activities of NRCS and others. The WCIS provides information related to climate studies, air and water quality investigations, and water resource management concerns. The highelevation watershed locations and the broad coverage of the network provide important data collection opportunities to researchers, water managers, and emergency managers for natural disasters such as floods. WCIS is maintained by NRCS National Water and Climate Center, located in Portland, Oregon. All data received by the WCIS central computer is linked to the Centralized Forecasting System where the public can access the data via the Center s homepage. USDA follows Federal systems security requirements set forth by the Office of Management and Budget (OMB). The National Institute of Standards and Technology (NIST) interprets OMB s requirements and issues guidance to foster compliance. USDA s OCIO passes the requirements and guidance to the agencies within the Department and ensures that the Federal requirements USDA/OIG-AUDIT/ SF Page 1

8 are met. Within NRCS, the CIO is responsible for informing field units of the OMB requirements and establishing controls to ensure the units respond to Department oversight and report to the OCIO on the status of systems security. Objective Our audit objective was to determine if the Water and Climate Information System s application controls are in place and are functioning to provide for accuracy, and completeness of system data. Our review did not identify any problem with the completeness and accuracy of the data once it was collected. During this audit, we expanded our original objective to: 1) determine if it was properly secured against unauthorized access and if its data was adequately protected from unauthorized alteration, and 2) assess the adequacy of management oversight of system security. USDA/OIG-AUDIT/ SF Page 2

9 Findings and Recommendations Section 1. Management Oversight Finding 1 NRCS Did Not Maintain Oversight or Control Over WCIS The information in NRCS Water and Climate Information System (WCIS) has neither been adequately secured from threats to data integrity, nor appropriately prepared to recover in the event of major system failure. Although there is a wealth of Federal and Departmental guidance designed to obviate these concerns, NRCS Chief Information Officer (CIO), due to a variety of circumstances described below, did not have controls in place to affect the appropriate policies and procedures, or to monitor their implementation. As a result, the agency cannot be assured of the integrity of data used, for example, by farmers to prepare for drought, emergency workers to anticipate flooding, and reservoirs to manage water reserves. Following Federal regulation, the Department level OCIO enforces Federal policies and procedures for securing information systems. The OCIO distributes its guidance to the agency level NRCS CIO who bears overall responsibility for making sure that it is put into practice within the agency. Following the OCIO s lead, NRCS CIO should disseminate the requirements either directly or through NRCS s Information System Security Program Manager (ISSPM) to information systems team leaders in the field who carry out the security instructions. The team leaders should then communicate back up through the chain of command so that the CIO can ensure that the systems are secured according to regulation. Information System Security Management Over WCIS Office of the Chief Information Officer US Department of Agriculture (enforces Federal policies and procedures for securing information systems) Chief Information Officer (CIO) National Resources Conservation Service (NRCS) (ensures that policies and procedures are effected) Information System Security Program Manager (ISSPM) NRCS (carries out CIO's direction and provides a liason with the field) Information System Team Leader National Water and Climate Center (implements security direction from management and maintains Water and Climate Information System (WCIS)) Our audit determined that NRCS CIO did not provide the field level team leader with OCIO direction regarding contingency plans, security plans, USDA/OIG-AUDIT/ SF Page 3

10 Recommendation No. 1 system certification, and risk assessments (see finding 2 below). In addition, when there were OCIO instructions provided to scan the Water and Climate Information System each month, the CIO did not maintain management oversight to make certain that the job was done. As a result, the system was not properly secured. When we scanned the system during our audit, we found two high-risk and one medium-risk vulnerability that could have been exploited to gain access to sensitive data and possibly allow the system to be compromised. The details are described in Finding 3 of this report. Establish controls to communicate Federal and Department level security guidance to field level units and develop an oversight system to ensure compliance. Agency Response. NRCS response stated that the CIO does not have direct line authority to direct, control, and manage operations of the WCC (National Water and Climate Center). The response added that this issue is a leadership call to address, mitigate, and correct as leadership deems appropriate. OIG Position. NRCS response did not address the audit recommendation. In order to reach management decision, NRCS needs to provide OIG with the specific controls that NRCS plans to establish that will communicate all NIST and USDA security requirements to the field level units as well as the timeframes when the controls will be implemented. USDA/OIG-AUDIT/ SF Page 4

11 Section 2. Security Weaknesses Without proper controls, the Water and Climate Information System is at risk of being compromised. As previously described, NRCS CIO is responsible for effecting and monitoring the agency s information system security but did not have adequate mechanisms in place to communicate Department level security guidance to the field level where that guidance is implemented. As a result at that time of our audit, the Water and Climate Information System was not adequately secured. Finding 2 Preventive Security Measures Did Not Meet Requirements The National Water and Climate Center (Center) did not properly prepare to recover the WCIS in case of disaster, update security plans to safeguard the WCIS, certify the WCIS, or assess the WCIS for risks. In each case, information system team leader stated that he had not been made aware of security requirements (or changes to the requirements). Without the safeguards developed by the Department to protect it from known risks, NRCS WCIS remained unnecessarily vulnerable and less likely to recover should its vulnerability be exploited. The Office of Management and Budget (OMB) Circular A-130 sets general Federal security requirements for information systems, and the National Institute of Standards and Technology (NIST) issues guidance that translates those requirements into more specific steps 1 (OMB A-130 states agencies must implement NIST guidance) Departmental requirements (manuals, directives, etc.) further formalize these rules into policies and procedures. Our audit determined that several security measures undertaken by the Center did not meet the above requirements. Contingency Plans OMB A requires agencies to plan for how they will continue to perform their mission or recover from the loss of application support in the event of a system failure. NIST 3 states that general support systems require contingency plans. It also states that contingency plans should be tested since untested or outdated contingency plans create the false sense of a system s ability to recover in a timely manner. 1 OMB A-130, Appendix III, dated November 30, OMB A-130, Appendix III, dated November 30, NITS SP , Guide for Developing Security Plans for IT Systems, dated December USDA/OIG-AUDIT/ SF Page 5

12 Cyber Security (CS) issued by the OCIO requires the agency to develop and implement an executable IT Disaster Recovery Plan for each critical application. NIST 5 specifies that Disaster Recovery Plans apply to major, usually catastrophic, events that deny access to the normal facility for an extended period, and for disruptions that require relocation. WCIS contingency plan did not indicate how the agency intends to recover the system in the event of catastrophic system failure. NRCS CIO said that due to workload and other priorities, she was unable to monitor the contingency plan development to ensure that was progressing as required by OMB and NIST regulations. The CIO did state that NRCS is negotiating with a contractor to develop an appropriate disaster recovery site, but the contract had not been signed as of the date of our review. In addition, the information systems team leader said that the team was in the process of getting the disaster recovery plan completed by April Security Plans OMB A-130 requires agencies to prepare a security plan. According to NIST, 6 there should be a policy that requires the production, update, and review of system security plans on a periodic basis or when the systems are implemented or significantly changed. CS requires all Security Plans be submitted to the OCIO by April each year. The Center did have one overall general security plan for its network, but the security plan was not properly reviewed, approved, updated, or submitted annually. The security plans for WCIS lacked documentation that indicated who approved the changes (name and title of approving management official and date of approval). The information systems team leader stated he was not aware that the security plans needed formal written certification and approval whenever updates and changes were made. The Center did not have a policy that required updates and review of system security plans on a periodic basis. Although the Center had security plans there was no evidence indicating that it had periodically reviewed the security plans since CS-028, IT Contingency and Disaster Planning, dated 5/23/03, Referenced to DR 3500, Chapter NIST SP , Contingency Planning Guide for Information Technology Systems, dated June NIST SP , Guide for Developing Security Plans for IT Systems, dated December CS-025, Cyber Security Plan, dated March 31, 2003 Referenced to DM 3500, Chapter 13. USDA/OIG-AUDIT/ SF Page 6

13 NRCS CIO confirmed our determination that due to workloads and other priorities, controls had not been established to ensure that the security plan was updated according to NIST guidelines and that the updated plan was submitted to the Department on an annual basis. Certification and Accreditation OMB Circular A states that accreditation of a system to process information provides an important quality control. The USDA Certification and Accreditation Guide 9 requires agencies to ensure that a management official authorizes the use of each system before beginning or significantly changing processing in the system. Use of the system must be re-authorized at least every 3 years. Although WCIS has been in use since 1980, the system had not been certified and accredited. The information system team leader was unaware of the requirement until September 2003 at which time a contract was written to have this work done. Subsequently, the CIO directed the Center to certify and accredit WCIS, and the team leader informed us that he anticipates completion in September Risk Assessments NIST s October 2001 Risk Management Guide requires that a risk assessment include: 1) the identification of threats and vulnerabilities; 2) the identification and analysis of security controls; 3) the analysis of impact or magnitude of harm that a loss of confidentiality, integrity, or availability would have on operations (including mission, functions, image, or reputation), assets, or individuals; 4) the likelihood of threat exploitation of vulnerabilities; and 5) determination of risk. 11 CS states that a formal system risk analysis is required every three years or when a major change in made in a system. Major changes are defined as modifications to the system that affect the security controls and which render the system vulnerable to compromise or intrusion. In 2002, when Center staff conducted a risk assessment for WCIS, they did not do so according to the above NIST requirements. Instead, they relied on a previous assessment prepared by a contractor before the October 2001 requirements were in place. When we questioned the CIO about the risk assessment, she stated that she had not established controls to ensure that risk assessments had been properly completed. 8 OMB A-130, Appendix III, Section B(a)4, dated November USDA Certification and Accreditation Guide, dated June 2, OMB recently tied C&A to budget (funding) availability and the USDA set a goal of having all systems certified and accredited by 9/30/04 11 NIST SP , dated October CS-031, Chapter 8, Risk Management Program, dated July 7, 2003 USDA/OIG-AUDIT/ SF Page 7

14 Recommendation No. 2 Recommendation No. 3 Recommendation No. 4 Overall, the CIO did not communicate current policies and procedures to field level staff responsible for implementation. During our review, we found that WCIS had issued a contract to have an independent contractor develop the contingency plan, security plan and risk assessment by June 30, 2004, so that the WCIS can be certified and accredited by September 30, Develop a disaster recovery plan in accordance with OMB and NIST requirements as part of the contingency plan and test the complete contingency plan once developed. Agency Response. The WCIS Certification and Accreditation was completed on September 30, 2004, with the IT Contingency/Disaster Recovery Plan testing being completed in April 1, OIG Position. We accept NRCS management decision on this recommendation. The estimated final action date is April 1, Establish a formal approval process for security plans that documents the name and title of the approving management official and the date of approval and follow Departmental Regulations. Agency Response. The NRCS IRM Security Manual and the National IRM Manuals are scheduled for review and updates in accordance with current Departmental policy and NIST guidance. Both manuals will incorporate language relative to Certification and Accreditation, by December 30, OIG Position. We accept NRCS management decision on this recommendation. The estimated final action date is December 30, Implement procedures requiring that the security plan be reviewed, updated, and certified per NIST guidelines and that updated plans be submitted to the OCIO on an annual basis. USDA/OIG-AUDIT/ SF Page 8

15 Recommendation No. 5 Agency Response. The NRCS IRM Security Manual and National IRM Manuals are scheduled for review and updates in accordance with current Departmental policy and NIST guidance. Both manuals also will incorporate language relative to Certification and Accreditation and Security Plan updates, by December 30, OIG Position. We accept NRCS management decision for this recommendation. The estimated final action date is December 30, Perform a Certification and Accreditation (C&A) on the WCIS system per OMB regulations and USDA guidance. Agency Response. The Certification September 30, and Accreditation on WCIS was completed on Recommendation No. 6 OIG Position. We accept NRCS management decision for this recommendation. The final action date was September 30, Establish controls to ensure that use of the WCIS system is reauthorized every 3 years. Agency Response. Once Certification and Accreditation for WCIS is completed, NRCS will work on a continual basis to ensure that WCIS is reauthorized every 3 years according to USDA and NIST policies and regulations. OIG Position. In order to reach management decision on this recommendation, NRCS needs to provide an estimated completion date on when the controls will be established. USDA/OIG-AUDIT/ SF Page 9

16 Recommendation No. 7 Complete risk assessments of the WCIS that will meet NIST, OMB and USDA requirements. Agency Response. The NRCS security team conducted a Risk Assessment on WCIS during July 2004, and will maintain these requirements per USDA and NIST policies and regulations. OIG Position. We accept NRCS management decision on this recommendation. The final action date was July Finding 3 Vulnerability Scans Not Conducted Monthly vulnerability scans of the WCIS were not conducted (vulnerability scans analyze a computer system to identify well-known security weaknesses). The Center s staffs had guidance requiring them to perform these scans on a monthly basis, but they were not performing them. Since the CIO did not have an oversight mechanism in place (e.g., monthly reporting of scan results), the lack of compliance continued until the time of our audit. Without the scans to timely identify serious weaknesses, the system had a significant risk of being compromised. USDA Departmental Manual 13 states, information system security (ISS) scanner software will be run on a monthly basis on all computer systems. Cyber Security Policy and Procedure 14 states agency management or the CIO will ensure that all agency/staff offices order and use the software to conduct ISS scans on a monthly basis. In February 2004, we interviewed the information systems team leader and learned that the Center had just completed its first ISS scan of WCIS. The team leader stated that there had been no guidance from the CIO to make sure that the monthly scans were done. On February 23, 2004, the day we arrived to begin our audit Center staff obtained the scanning software which had been available since 2001 and ran the vulnerability scan. The software detected two high-risk vulnerabilities 13 Departmental Manual , Chapter 6, dated April 4, OCIO CS-007, dated September 5, 2001 USDA/OIG-AUDIT/ SF Page 10

17 Recommendation No. 8 Recommendation No. 9 and one medium-risk vulnerability. 15 We confirmed their results during two separate scans in March Require responsible officials to timely submit verification to the CIO that monthly vulnerability scans have been run on WCIS. Agency Response. A monthly report on scan activity will be reported to the CIO by the NRCS ISSPM. The action is to be completed by December 30, OIG Position. We accept NRCS management decision on this recommendation. The estimated final action date is December 30, Take immediate action to correct the high- and medium-risk vulnerabilities identified by the scans and conduct an immediate rescan to ensure that the vulnerabilities have been corrected. Agency Response. On the two high-risk vulnerabilities identified by the scanning software: a) one was found to be a false positive indicating the vulnerability did not exist, and (b) the second high-risk vulnerability involved the presence of system services, which are required to meet a business requirement and function of WCIS. This vulnerability was mitigated by ensuring that no shell interpreters were in the root/cgi-bin, in accordance with the accepted security practices, and this mitigation was in place at the time of the scans. On the medium vulnerability, it also involved the existence of a required service running on the server. This server has been patched to mitigate this medium vulnerability. OIG Position. We accept NRCS management decision for this recommendation. The final action date was October High-risk vulnerabilities are those that could allow access to the computer and possibly to the network of computers. Medium-risk vulnerabilities are those that could allow access to sensitive network data that may lead to exploitation of other vulnerabilities USDA/OIG-AUDIT/ SF Page 11

18 Scope and Methodology For this audit, we reviewed the adequacy of application controls over the Center s WCIS network. We selected the WCIS for review because the parent agency, NRCS, had identified this system as a major application needing to be certified and accredited. This audit of NRCS is part of a nationwide audit of USDA mission-critical systems. A nationwide audit report will be issue to the Department s Office of the Chief Information Officer by OIG s Financial and Information Technology Operations and might include sections of this report. This review was performed at NRCS Center located in Portland, Oregon. Fieldwork was performed from February 23, 2004, through March 25, Our review included an evaluation of the data within the WCIS to determine if it was complete and accurate once it was collected by the sensors located in the snow pack in the mountains. We did not evaluate the sensors themselves to determine their reliability at the collection stage. Our review did not identify any problems or concerns with completeness and accuracy of the data once it was collected. During the audit, we expanded out objective to review the overall security of system data, including management oversight of system security. To accomplish our audit objectives, we performed the following audit steps and procedures: We reviewed IT security policies and procedures from the Department s Office of the Chief Information Officer, OMB, NIST, and USDA Departmental Manual. We interviewed responsible NRCS officials managing the WCIS. We performed ISS vulnerability scans on the WCIS. We analyzed records and controls (Contingency Plan, Security Plan, Risk assessment and Certification and Accreditation Process) established to ensure the data integrity of the WCIS. This audit was performed in accordance with generally accepted government auditing standards. USDA/OIG-AUDIT/ SF Page 12

19 Exhibit A NRCS Response to Draft Report Exhibit A Page 1 of 6 USDA/OIG-AUDIT/ SF Page 13

20 Exhibit A NRCS Response to Draft Report Exhibit A Page 2 of 6 USDA/OIG-AUDIT/ SF Page 14

21 Exhibit A NRCS Response to Draft Report Exhibit A Page 3 of 6 USDA/OIG-AUDIT/ SF Page 15

22 Exhibit A NRCS Response to Draft Report Exhibit A Page 4 of 6 USDA/OIG-AUDIT/ SF Page 16

23 Exhibit A NRCS Response to Draft Report Exhibit A Page 5 of 6 USDA/OIG-AUDIT/ SF Page 17

24 Exhibit A NRCS Response to Draft Report Exhibit A Page 6 of 6 USDA/OIG-AUDIT/ SF Page 18

25 Informational copies of this report have been distributed to: Government Accountability Office (2) Office of Management and Budget (1) Office of the Chief Financial Officer Director, Planning and Accountability Division (1)

Audit Report. Management and Security of Office of Budget and Program Analysis Information Technology Resources. U.S. Department of Agriculture

Audit Report. Management and Security of Office of Budget and Program Analysis Information Technology Resources. U.S. Department of Agriculture U.S. Department of Agriculture Office of Inspector General Southeast Region Audit Report Management and Security of Office of Budget and Program Analysis Information Technology Resources Report No. 39099-1-AT

More information

Audit Report. Management and Security of Office of the Chief Economist Information Technology Resources. U.S. Department of Agriculture

Audit Report. Management and Security of Office of the Chief Economist Information Technology Resources. U.S. Department of Agriculture U.S. Department of Agriculture Office of Inspector General Southeast Region Audit Report Management and Security of Office of the Chief Economist Information Technology Resources Report No. 12099-1-AT

More information

How To Check If Nasa Can Protect Itself From Hackers

How To Check If Nasa Can Protect Itself From Hackers SEPTEMBER 16, 2010 AUDIT REPORT OFFICE OF AUDITS REVIEW OF NASA S MANAGEMENT AND OVERSIGHT OF ITS INFORMATION TECHNOLOGY SECURITY PROGRAM OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration

More information

U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report

U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report SECURITY OF INFORMATION TECHNOLOGY RESOURCES AT USDA DEPARTMENTAL ADMINISTRATION Report No. 23099-2-FM

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

EPA Could Improve Its Information Security by Strengthening Verification and Validation Processes

EPA Could Improve Its Information Security by Strengthening Verification and Validation Processes OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment EPA Could Improve Its Information Security by Strengthening Verification and Validation Processes Report No. 2006-P-00002

More information

Information Security Series: Security Practices. Integrated Contract Management System

Information Security Series: Security Practices. Integrated Contract Management System OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment Information Security Series: Security Practices Integrated Contract Management System Report No. 2006-P-00010 January 31,

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL FY 2015 INDEPENDENT EVALUATION OF THE EFFECTIVENESS OF NCUA S INFORMATION SECURITY PROGRAM UNDER THE FEDERAL INFORMATION SECURITY MODERNIZATION

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

APHIS INTERNET USE AND SECURITY POLICY

APHIS INTERNET USE AND SECURITY POLICY United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

OFFICIAL USE ONLY. Department of Energy. DATE: January 31, 2007 Audit Report Number: OAS-L-07-06

OFFICIAL USE ONLY. Department of Energy. DATE: January 31, 2007 Audit Report Number: OAS-L-07-06 DOE F 1325.8 (08-93) United States Government Memorandum Department of Energy DATE: January 31, 2007 Audit Report Number: OAS-L-07-06 REPLY TO ATTN OF: SUBJECT: TO: IG-34 (A06TG041) Evaluation of the "Office

More information

Evaluation Report. Office of Inspector General

Evaluation Report. Office of Inspector General Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury

More information

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference

More information

THE INFORMATION TECHNOLOGY INFRASTRUCTURE

THE INFORMATION TECHNOLOGY INFRASTRUCTURE Department of Health and Human Services OFFICE OF INSPECTOR GENERAL THE INFORMATION TECHNOLOGY INFRASTRUCTURE AND OPERATIONS OFFICE HAD INADEQUATE INFORMATION SECURITY CONTROLS Inquires about this report

More information

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND

More information

U.S. Department of Agriculture Office of Inspector General Southwest Region Audit Report

U.S. Department of Agriculture Office of Inspector General Southwest Region Audit Report U.S. Department of Agriculture Office of Inspector General Southwest Region Audit Report SECURITY OVER NATURAL RESOURCES CONSERVATION SERVICE S INFORMATION TECHNOLOGY RESOURCES Report No. 10099-1-Te JANUARY

More information

How To Improve Nasa'S Security

How To Improve Nasa'S Security DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL

More information

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000. U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 Department

More information

Final Audit Report -- CAUTION --

Final Audit Report -- CAUTION -- U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management

More information

Review of the SEC s Systems Certification and Accreditation Process

Review of the SEC s Systems Certification and Accreditation Process Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy

More information

How To Audit The Mint'S Information Technology

How To Audit The Mint'S Information Technology Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit

More information

INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK

INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK MARCH 28, 2011 AUDIT REPORT OFFICE OF AUDITS INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration REPORT NO. IG-11-017

More information

United States Department of Agriculture. Office of Inspector General

United States Department of Agriculture. Office of Inspector General United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture, Office of the Chief Information Officer, Fiscal Year 2013 Federal Information Security Management Act

More information

Hanh Do, Director, Information System Audit Division, GAA. SUBJECT: Review of HUD s Information Technology Contingency Planning and Preparedness

Hanh Do, Director, Information System Audit Division, GAA. SUBJECT: Review of HUD s Information Technology Contingency Planning and Preparedness Issue Date: August 31, 2006 Audit Report Number 2006-DP-0005 TO: Lisa Schlosser, Chief Information Officer, A FROM: Hanh Do, Director, Information System Audit Division, GAA SUBJECT: Review of HUD s Information

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES

INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES Report No.: ISD-IS-OCIO-0001-2014 June 2014 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR Memorandum JUN 0 4 2014 To: From:

More information

NASA OFFICE OF INSPECTOR GENERAL

NASA OFFICE OF INSPECTOR GENERAL NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA

More information

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Audit Report Management of Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 Department

More information

Audit Report. Management of Naval Reactors' Cyber Security Program

Audit Report. Management of Naval Reactors' Cyber Security Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,

More information

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.

More information

EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human Health and the Environment

EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human Health and the Environment U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

POSTAL REGULATORY COMMISSION

POSTAL REGULATORY COMMISSION POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1

More information

Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02

Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 BACKGROUND OBJECTIVES, SCOPE, AND METHODOLOGY FINDINGS INFORMATION SECURITY PROGRAM AUDIT FOLLOW-UP CATS SECURITY PROGRAM PLANNING

More information

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION

More information

REPORT ON FY 2006 FISMA AUDIT OF THE SMITHSONIAN INSTITUTION S INFORMATION SECURITY PROGRAM

REPORT ON FY 2006 FISMA AUDIT OF THE SMITHSONIAN INSTITUTION S INFORMATION SECURITY PROGRAM REPORT ON FY 2006 FISMA AUDIT OF THE SMITHSONIAN INSTITUTION S INFORMATION SECURITY PROGRAM Cotton & Company LLP Auditors Advisors 635 Slaters Lane, 4 th Floor Alexandria, Virginia 22314 703.836.6701 www.cottoncpa.com

More information

AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS

AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS SEPTEMBER 14, 2010 AUDIT REPORT OFFICE OF AUDITS AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7 PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255

More information

AUDIT REPORT. The Energy Information Administration s Information Technology Program

AUDIT REPORT. The Energy Information Administration s Information Technology Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department

More information

SMITHSONIAN INSTITUTION

SMITHSONIAN INSTITUTION SMITHSONIAN INSTITUTION FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA) 2012 INDEPENDENT EVALUATION REPORT TABLE OF CONTENTS PURPOSE 1 BACKGROUND 1 OBJECTIVES, SCOPE, AND METHODOLOGY 2 SUMMARY OF RESULTS

More information

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07 EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

United States Department of Agriculture. Office of Inspector General

United States Department of Agriculture. Office of Inspector General United States Department of Agriculture Office of Inspector General Management and Security Over USDA s Universal Telecommunications Network Audit Report 88501-0002-12 What Were OIG s Objectives We conducted

More information

Improved Security Planning Needed for the Customer Technology Solutions Project

Improved Security Planning Needed for the Customer Technology Solutions Project U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Quick Reaction Report Catalyst for Improving the Environment Improved Security Planning Needed for the Customer Technology Solutions Project

More information

SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE

SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE FOR OFFICIAL USE ONLY SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE Department of Transportation Report No. FI-2013-123 Date Issued: September 10,

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Bonneville Power Administration's Information Technology Program DOE/IG-0861 March 2012

More information

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,

More information

INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED AND MONITORED

INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED AND MONITORED Department of Health and Human Services OFFICE OF INSPECTOR GENERAL INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED

More information

Project Delays Prevent EPA from Implementing an Agency-wide Information Security Vulnerability Management Program

Project Delays Prevent EPA from Implementing an Agency-wide Information Security Vulnerability Management Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment Project Delays Prevent EPA from Implementing an Agency-wide Information Security Vulnerability

More information

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive

More information

Department of Homeland Security Office of Inspector General. DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems

Department of Homeland Security Office of Inspector General. DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems Department of Homeland Security Office of Inspector General DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems OIG-10-111 August 2010 Office ofinspector General u.s. Department

More information

U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report

U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL SECURITY OF THE NCUA DATA CENTER Report # August 12, 2013 James Hagen Inspector General W. Marvin Stith, CISA Senior IT Auditor Table of

More information

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for U.S. Coast Guard Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General,

More information

REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013

REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013 Department of Health and Human Services OFFICE OF INSPECTOR GENERAL REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013 Inquiries about this report may be addressed

More information

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of

More information

Office of Inspector General

Office of Inspector General Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases

More information

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION SYSTEM GENERAL CONTROLS AT THREE CALIFORNIA MANAGED-CARE

More information

REVIEW OF THE DEPARTMENT OF HEALTH AND HUMAN SERVICES COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MODERNIZATION ACT OF 2014 FOR FISCAL YEAR 2015

REVIEW OF THE DEPARTMENT OF HEALTH AND HUMAN SERVICES COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MODERNIZATION ACT OF 2014 FOR FISCAL YEAR 2015 Department of Health and Human Services OFFICE OF INSPECTOR GENERAL REVIEW OF THE DEPARTMENT OF HEALTH AND HUMAN SERVICES COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MODERNIZATION ACT OF 2014 FOR

More information

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations. Testimony of: Kay Daly Assistant Inspector General for Audit Services Office of Inspector General, U.S. Department of Health and Human Services Hearing Title: The Threat to Americans Personal Information:

More information

a GAO-05-700 GAO INFORMATION SECURITY Department of Homeland Security Needs to Fully Implement Its Security Program

a GAO-05-700 GAO INFORMATION SECURITY Department of Homeland Security Needs to Fully Implement Its Security Program GAO United States Government Accountability Office Report to the Ranking Minority Member, Committee on Homeland Security and Governmental Affairs, U.S. Senate June 2005 INFORMATION SECURITY Department

More information

NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014

NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014 NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix

More information

Office of the Secretary

Office of the Secretary U.S. DEPARTMENT OF COMMERCE Office of Inspector General Office of the Secretary Federal Information Security Management Act Audit Identified Significant Issues Requiring Management Attention Final Report

More information

CHAPTER 12, PART 1 SECURITY REQUIREMENTS FOR CPIC

CHAPTER 12, PART 1 SECURITY REQUIREMENTS FOR CPIC CHAPTER 12, PART 1 SECURITY REQUIREMENTS FOR CPIC 1 BACKGROUND The Clinger-Cohen Act of 1996 requires that Federal agencies institute a disciplined approach to managing and controlling Information Technology

More information

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR August 6, 2003 M-03-19 MEMORANDUM FOR HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua

More information

GAO INFORMATION SECURITY. Fundamental Weaknesses Place EPA Data and Operations at Risk. Testimony

GAO INFORMATION SECURITY. Fundamental Weaknesses Place EPA Data and Operations at Risk. Testimony GAO United States General Accounting Office Testimony INFORMATION SECURITY Fundamental Weaknesses Place EPA Data and Operations at Risk Statement of David L. McClure Associate Director, Governmentwide

More information

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

Privacy Impact Assessment Forest Service Computer Base Legacy

Privacy Impact Assessment Forest Service Computer Base Legacy Forest Service Computer Base Legacy Cyber and Privacy Policy and Oversight Version: 2.0 Date: July 19, 2010 Prepared for: USDA OCIO CPPO Privacy Impact Assessment for the Forest Service Computer Base Legacy

More information

Privacy Impact Assessment

Privacy Impact Assessment Technology, Planning, Architecture, & E-Government Version: 1.1 Date: April 14, 2011 Prepared for: USDA OCIO TPA&E Privacy Impact Assessment for the April 14, 2011 Contact Point Charles McClam Deputy Chief

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted

More information

U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report

U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report INFORMATION SECURITY AT THE NATIONAL AGRICULTURAL STATISTICS SERVICE Report No. 26099-2-FM March 2002

More information

Office of the Inspector General United States Office of Personnel Management. Statement of Michael R. Esser Assistant Inspector General for Audits

Office of the Inspector General United States Office of Personnel Management. Statement of Michael R. Esser Assistant Inspector General for Audits Office of the Inspector General United States Office of Personnel Management Statement of Michael R. Esser Assistant Inspector General for Audits before the Committee on Appropriations United States Senate

More information

Audit of the Board s Information Security Program

Audit of the Board s Information Security Program Board of Governors of the Federal Reserve System Audit of the Board s Information Security Program Office of Inspector General November 2011 November 14, 2011 Board of Governors of the Federal Reserve

More information

EPA Needs to Strengthen Its Privacy Program Management Controls

EPA Needs to Strengthen Its Privacy Program Management Controls OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment EPA Needs to Strengthen Its Privacy Program Management Controls Report No. 2007-P-00035 September 17, 2007 Report Contributors:

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. ELECTION ASSISTANCE COMMISSION EVALUATION OF COMPLIANCE WITH THE REQUIREMENTS OF THE FEDERAL INFORMATION SECURITY MANAGEMENT

More information

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General

More information

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Modernization Act Audit for Fiscal Year 2015 March 15, 2016 15-01957-100 ACRONYMS

More information

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This

More information

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938

More information

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 22, 20 14

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 22, 20 14 UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL INFORMATION TECHNOLOGY AUDIT DIVISION September 22, 20 14 FINAL MANAGEMENT INFORMATION REPORT To: From: Subject: James W. Runcie ChiefOperating

More information

NUMBER OF MATERIAL WEAKNESSES

NUMBER OF MATERIAL WEAKNESSES APPENDIX A: PERFORMANCE AND RESOURCE TABLES MANAGEMENT DISCUSSION AND ANALYSIS MANAGEMENT CONTROLS FEDERAL MANAGER S FINANCIAL INTEGRITY ACT (FMFIA) OF 1982 D uring FY 2005, the Department reviewed its

More information

Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness.

Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness. Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness September 2004 Reference Number: 2004-20-155 This report has cleared the Treasury

More information

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12 Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General

More information

INFORMATION SECURITY. VA Needs to Address Identified Vulnerabilities

INFORMATION SECURITY. VA Needs to Address Identified Vulnerabilities United States Government Accountability Office Report to the Chairman, Committee on Veterans Affairs, House of Representatives November 2014 INFORMATION SECURITY VA Needs to Address Identified Vulnerabilities

More information

GOVERNMENT INFORMATION SECURITY REFORM ACT STATUS OF EPA S COMPUTER SECURITY PROGRAM

GOVERNMENT INFORMATION SECURITY REFORM ACT STATUS OF EPA S COMPUTER SECURITY PROGRAM Office of Inspector General Audit Report GOVERNMENT INFORMATION SECURITY REFORM ACT STATUS OF EPA S COMPUTER SECURITY PROGRAM Report Number: 2001-P-00016 September 7, 2001 Inspector General Division Conducting

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2014 May 19, 2015 14-01820-355 ACRONYMS CRISP

More information

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002

More information

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES

More information

United States Department of Agriculture Office of Inspector General

United States Department of Agriculture Office of Inspector General United States Department of Agriculture Office of Inspector General Audit of the Office of the Chief Information Officer's FYs 2010 and 2011 Funding Received for Security Enhancements Audit Report 88401-0001-12

More information